Fr. 160.00

Intrusion Detection in Wireless Ad-Hoc Networks

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more










Presenting cutting-edge research, this book explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it provides readers with the understanding required to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.


List of contents

Introduction. Architecture and Organization Issues. Routing for ad-hoc Networks. Different Types of Routing Attacks for WANs. IDSX. HIDS. BHIDS. Intrusion Detection for Wireless Mesh Networks. Security in WAN and Quality of Services (QoS). Future Trends in WAN Security.

About the author

Nabendu Chaki is a senior member of the Institute of Electrical and Electronics Engineers (IEEE ) and an associate professor in the Department of Computer Science and Engineering, University of Calcutta, India. Besides editing several volumes for Springer in the Lecture Notes in Computer Science (LNCS) and other series, Nabendu has authored two textbooks and more than 100 refereed research papers in journals and international conferences.

His areas of research interests include distributed systems and network security. Dr. Chaki has also served as a research assistant professor in the Ph.D. program in software engineering in the U.S. Naval Postgraduate School, Monterey, California. He is a visiting faculty member for many universities, including the University of Ca’Foscari, Venice, Italy. Dr. Chaki is a knowledge area editor in mathematical foundation for the SWEBOK project of the IEEE Computer Society. Besides being on the editorial board for Springer Verlag and many international journals, he has also served on the committees of more than 50 international conferences.

Rituparna Chaki has been an associate professor in the A.K. Choudhury School of Information Technology, University of Calcutta, India, since June 2013. She joined academia as a faculty member at the West Bengal University of Technology in 2005. Before that, she served under the government of India in maintaining its industrial production database.

Rituparna completed her Ph.D. from Jadavpur University in 2002. She has been associated with organizing many conferences in India and abroad as program chair, organizing chair, or member of the Technical Program Committee. She has published more than 60 research papers in reputed journals and peer-reviewed conference proceedings. Her research interest is primarily in ad-hoc networking and its security. She is a professional member of IEEE and ACM.

Summary

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.

This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.

  • Addresses architecture and organization issues
  • Examines the different types of routing attacks for WANs
  • Explains how to ensure Quality of Service in secure routing
  • Considers honesty and trust-based IDS solutions
  • Explores emerging trends in WAN security
  • Describes the blackhole attack detection technique
Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.